STIGQter STIGQter: STIG Summary: Apache Server 2.4 UNIX Server Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

The Apache web server must be configured to immediately disconnect or disable remote access to the hosted applications.

DISA Rule

SV-214260r615684_rule

Vulnerability Number

V-214260

Group Title

SRG-APP-000316-WSR-000170

Rule Version

AS24-U1-000680

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Prepare documented procedures for shutting down an Apache website in the event of an attack.

The procedure should, at a minimum, provide the following steps:

Search for the PidFile runtime directive. (This example uses the combined results of HTTPD_ROOT and SERVER_CONFIG_FILE, above.) If this command returns a result, use this value in the kill command, otherwise, use the DEFAULT_PIDLOG value, above.

In a command line, enter the following command:

# grep -i pidfile /etc/httpd/conf/httpd.conf

# kill -TERM 'cat <FULLY-QUALIFIED_PIDFILE_FILENAME>'

Check Contents

Interview the SA and Web Manager.

Ask for documentation for the Apache web server administration.

Verify there are documented procedures for shutting down an Apache website in the event of an attack. The procedure should, at a minimum, provide the following steps:

Determine the respective website for the application at risk of an attack.

Determine the location of the "HTTPD_ROOT" directory and the "httpd.conf" file:

# httpd -V | egrep -i 'httpd_root|server_config_file|pidlog'
-D HTTPD_ROOT="/etc/httpd"
-D SERVER_CONFIG_FILE="conf/httpd.conf"
-D DEFAULT_PIDLOG=”/run/httpd/httpd.pid”


Search for the PidFile runtime directive. (This example uses the combined results of HTTPD_ROOT and SERVER_CONFIG_FILE, above.) If this command returns a result, use this value in the kill command, otherwise, use the DEFAULT_PIDLOG value, above.

# grep -i pidfile /etc/httpd/conf/httpd.conf

# kill -TERM `cat <FULLY-QUALIFIED_PIDFILE_FILENAME>`

If the web server is not capable of or cannot be configured to disconnect or disable remote access to the hosted applications when necessary, this is a finding.

Vulnerability Number

V-214260

Documentable

False

Rule Version

AS24-U1-000680

Severity Override Guidance

Interview the SA and Web Manager.

Ask for documentation for the Apache web server administration.

Verify there are documented procedures for shutting down an Apache website in the event of an attack. The procedure should, at a minimum, provide the following steps:

Determine the respective website for the application at risk of an attack.

Determine the location of the "HTTPD_ROOT" directory and the "httpd.conf" file:

# httpd -V | egrep -i 'httpd_root|server_config_file|pidlog'
-D HTTPD_ROOT="/etc/httpd"
-D SERVER_CONFIG_FILE="conf/httpd.conf"
-D DEFAULT_PIDLOG=”/run/httpd/httpd.pid”


Search for the PidFile runtime directive. (This example uses the combined results of HTTPD_ROOT and SERVER_CONFIG_FILE, above.) If this command returns a result, use this value in the kill command, otherwise, use the DEFAULT_PIDLOG value, above.

# grep -i pidfile /etc/httpd/conf/httpd.conf

# kill -TERM `cat <FULLY-QUALIFIED_PIDFILE_FILENAME>`

If the web server is not capable of or cannot be configured to disconnect or disable remote access to the hosted applications when necessary, this is a finding.

Check Content Reference

M

Target Key

3996

Comments